Vulnerability Description
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dart | Dart Software Development Kit | < 2.16.0 |
Related Weaknesses (CWE)
References
- https://dart-review.googlesource.com/c/sdk/+/229947Issue TrackingPatchThird Party Advisory
- https://github.com/dart-lang/sdk/commit/57db739be0ad4629079bfa94840064f615d35abcPatchThird Party Advisory
- https://dart-review.googlesource.com/c/sdk/+/229947Issue TrackingPatchThird Party Advisory
- https://github.com/dart-lang/sdk/commit/57db739be0ad4629079bfa94840064f615d35abcPatchThird Party Advisory
FAQ
What is CVE-2022-0451?
CVE-2022-0451 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By...
How severe is CVE-2022-0451?
CVE-2022-0451 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0451?
Check the references section above for vendor advisories and patch information. Affected products include: Dart Dart Software Development Kit.